Previous Chapter: 1. Introduction
Suggested Citation: "2. High-Grade Threats and High-Value Targets." National Research Council. 2001. Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information. Washington, DC: The National Academies Press. doi: 10.17226/10197.
Page 3
Suggested Citation: "2. High-Grade Threats and High-Value Targets." National Research Council. 2001. Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information. Washington, DC: The National Academies Press. doi: 10.17226/10197.
Page 4
Suggested Citation: "2. High-Grade Threats and High-Value Targets." National Research Council. 2001. Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information. Washington, DC: The National Academies Press. doi: 10.17226/10197.
Page 5
Next Chapter: 3. Psychological, Social, Legal and Managerial Aspects of the Insider Threat
Subscribe to Emails from the National Academies
Stay up to date on activities, publications, and events by subscribing to email updates.